CVE-2009-3557
https://notcve.org/view.php?id=CVE-2009-3557
The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments. La función tempnam de ext/standard/file.c de PHP v5.2.11 y anteriores, y v5.3.x anteriores a v5.3.1, permite a usuarios dependiendo del contexto evitar las restricciones safe_mode, y crear ficheros en directorios con permisos de sistema operativo de escritura para su grupo o para cualquier usuario, a través de los argumentos dir y prefix. • http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://marc.info/?l=bugtraq&m=127680701405735&w=2 http://news.php.net/php.announce/79 http://secunia.com/advisories/37412 http://secunia.com/advisories/37821 http://secunia.com/advisories/40262 http://securityreason.com/securityalert/6601 http://support.apple.com/kb/HT4077 http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/file.c?view=log http://svn.php.net/viewvc/p • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-3292 – php: exif extension: Multiple missing sanity checks in EXIF file processing
https://notcve.org/view.php?id=CVE-2009-3292
Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to "missing sanity checks around exif processing." Vulnerabilidad sin especificar en PHP en versiones anteriores a la v5.2.11 tiene un impacto desconocido y vectores de ataque relacionados con un "missing sanity checks around exif processing." (comprobaciones de validez no encontradas del procesamiento exif.). • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html http://marc.info/?l=bugtraq&m=127680701405735&w=2 http://marc.info/?l=bugtraq&m=130497311408250&w=2 http://news.php.net/php.announce/79 http://secunia.com/advisories/36791 http://secunia.com/advisories/37412 http://secunia.com/advisories/37482 http://secunia.com/advisories/40262 http://support.apple.com/kb/HT3937 http:/ •
CVE-2009-3291 – php: openssl extension: Incorrect verification of SSL certificate with NUL in name
https://notcve.org/view.php?id=CVE-2009-3291
The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates. La función php_openssl_apply_verification_policy de PHP en versiones anteriores a la v5.2.11 no realiza adecuadamente la validación de un certificado, lo que tiene un impacto y vectores de ataque desconocidos, probablemente relacionados con la posibilidad de suplantar certificados. • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html http://marc.info/?l=bugtraq&m=127680701405735&w=2 http://marc.info/?l=bugtraq&m=130497311408250&w=2 http://secunia.com/advisories/36791 http://secunia.com/advisories/37482 http://secunia.com/advisories/40262 http://support.apple.com/kb/HT3937 http://www.debian.org/security/2009/dsa-1940 http://www.osvdb.org/58185 http: • CWE-20: Improper Input Validation •
CVE-2009-3293
https://notcve.org/view.php?id=CVE-2009-3293
Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect "sanity check for the color index." Vulnerabilidad sin especificar en la función imagecolortransparent de PHP en versiones anteriores a la v5.2.11 tiene un impacto desconocido y vectores de ataque relacionados con un incorrecto "sanity check for the color index." (comprobación de validez de un índice de color.). • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html http://marc.info/?l=bugtraq&m=127680701405735&w=2 http://marc.info/?l=bugtraq&m=130497311408250&w=2 http://secunia.com/advisories/36791 http://secunia.com/advisories/40262 http://support.apple.com/kb/HT3937 http://www.osvdb.org/58187 http://www.php.net/ChangeLog-5.php#5.2.11 http://www.php.net/releases/5_2_11 •
CVE-2008-7068
https://notcve.org/view.php?id=CVE-2008-7068
The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file. La función dba_replace en PHP v5.2.6 y 4.x permite a atacantes dependientes de contexto producir una denegación de servicio (corte de fichero) a través de una clave con un byte NULL. NOTA: Esto solo se produce en unas circunstancias muy concretas en la cual el atacante puede modificar o añadir las entradas de la base de datos pero no tiene permisos para cortar el fichero. • http://cvs.php.net/viewvc.cgi/php-src/NEWS?r1=1.2027.2.547.2.1313&r2=1.2027.2.547.2.1314& http://securityreason.com/achievement_securityalert/58 http://www.osvdb.org/52206 http://www.securityfocus.com/archive/1/498746/100/0/threaded http://www.securityfocus.com/archive/1/498981/100/0/threaded http://www.securityfocus.com/archive/1/498982/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/47316 • CWE-20: Improper Input Validation •